Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Computer Science
Psychology
Cybersecurity
Greening the Economy: Sustainable Cities
Discover Dentistry
Academic Writing
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Revisiting insecure-by-design practices in OT devices, highlighting persistent security issues across industries and critical infrastructure, with technical deep-dives and implications for risk management.
Fuzzing techniques for MCU security in connected vehicles, using ARM ETM and code coverage-guided approach to enhance vulnerability detection and system robustness.
Explore AI-based framework for concealing attack intentions and protecting codes. Learn about Deep Puzzling, its core ideas, key points in data collection, feature extraction, and binary code generation modeling.
Panel discussion on cybersecurity challenges in healthcare, exploring device vulnerabilities, patient data protection, and industry responses. Experts share insights on improving security practices and addressing emerging threats in biomedical technology.
Overview of DeFi cybersecurity challenges, common attacks, and potential solutions. Explores smart contract vulnerabilities, bad practices, and strategies to enhance security in the rapidly growing decentralized finance ecosystem.
Insightful discussion with cybersecurity leader Mouza Al Romaithi on industry challenges, career growth, and the evolving threat landscape in the digital age.
Exploring pandemic-driven shifts in workplace security, this talk presents a model for protecting distributed workforce data and reducing organizational risk through adaptive access control.
Análisis retrospectivo e introspectivo del estado de la ciberseguridad, explorando desafÃos actuales, prácticas efectivas y tecnologÃas emergentes para mejorar la resiliencia y postura de seguridad.
Reverse engineering MediaTek's audio DSP firmware reveals vulnerabilities in RTOS and Android HAL, potentially enabling local privilege escalation and eavesdropping on user conversations.
Explore advanced HTTP response smuggling techniques, including protocol vulnerabilities, session hijacking, and response scripting, with real-world demonstrations on major ERP systems.
Explore large-scale malware behavior analysis using sandbox telemetry. Gain insights into infection patterns, commonalities, and evolving tactics to improve detection and mitigation strategies.
Explore new root causes of transient execution attacks, including machine clears, and discover novel attack primitives like Floating Point Value Injection and Speculative Code Store Bypass.
Explore software security analysis, covering vulnerability detection, attack mitigation, and automated exploit generation. Learn about cutting-edge research initiatives in program comprehension and security testing techniques.
Explore MIPS-based IoT device research with a framework for efficient emulation, vulnerability analysis, and exploit development. Gain insights into CPU architectures, virtualization, and cross-compilation techniques.
Explore low-level protocol fuzzing for secure microcontrollers, uncovering vulnerabilities in BootROM USB drivers. Learn about a custom fuzzing framework for SPI, I2C, USB, and UART, and its application in hardware security research.
Get personalized course recommendations, track subjects and courses with reminders, and more.